
www.oauth.digigante.com
95.217.235.49
Malicious Activity!
Submission: On March 19 via automatic, source certstream-suspicious — Scanned from FI
Summary
TLS certificate: Issued by R3 on March 19th 2023. Valid for: 3 months.
This is the only time www.oauth.digigante.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: mBank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 95.217.235.49 95.217.235.49 | 24940 (HETZNER-AS) (HETZNER-AS) | |
15 | 1 |
ASN24940 (HETZNER-AS, DE)
PTR: static.49.235.217.95.clients.your-server.de
www.oauth.digigante.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
digigante.com
www.oauth.digigante.com |
281 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | www.oauth.digigante.com |
www.oauth.digigante.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
oauth.digigante.com R3 |
2023-03-19 - 2023-06-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.oauth.digigante.com/
Frame ID: 7A641518508F5FB0CA741C4811CEA8D6
Requests: 15 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.oauth.digigante.com/ |
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.oauth.digigante.com/ |
21 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
www.oauth.digigante.com/socket/ |
82 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
socket.js
www.oauth.digigante.com/socket/ |
31 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LoginMain.svg
www.oauth.digigante.com/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LoginMain.png
www.oauth.digigante.com/ |
482 B 720 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LoginMain-1.png
www.oauth.digigante.com/ |
527 B 765 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
www.oauth.digigante.com/ |
98 KB 98 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adv.png
www.oauth.digigante.com/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
socket.php
www.oauth.digigante.com/socket/ |
261 B 462 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
avatar_retail.png
www.oauth.digigante.com/ |
34 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FSLolaLight.woff
www.oauth.digigante.com/ |
49 KB 49 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSansReg.woff
www.oauth.digigante.com/ |
41 KB 41 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
socket.php
www.oauth.digigante.com/socket/ |
313 B 405 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
socket.php
www.oauth.digigante.com/socket/ |
313 B 405 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: mBank (Banking)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery undefined| myInterval undefined| loadingInterval string| currentMtd function| query function| arrToObj function| getCookie function| setCookie function| deleteCookie function| isEmpty function| getUrlParameter function| getMtdStr function| formWait function| formWaitEnd function| usrComeBack function| formWaitReset function| startTimer function| sndCustomComment function| showSmartKeyForm function| showSmsCodeForm function| showLoginForm function| openTicari function| openBireysel function| sendStatus object| data1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.oauth.digigante.com/ | Name: userid Value: %D0%9E%D1%88%D0%B8%D0%B1%D0%BA%D0%B0%3A%20%D0%9D%D0%B5%D0%B2%D0%BE%D0%B7%D0%BC%D0%BE%D0%B6%D0%BD%D0%BE%20%D0%BF%D0%BE%D0%B4%D0%BA%D0%BB%D1%8E%D1%87%D0%B8%D1%82%D1%8C%D1%81%D1%8F%20%D0%BA%20MySQL%20Access%20denied%20for%20user%20'root'%40'localhost'%20(using%20password%3A%20YES)Error%3A%20INSERT%20INTO%20guests%20(data)%0A%20%20%20%20VALUES%20('%5B%7B%22u%22%3A%22The%20user%20went%20to%20the%20page%3Cbr%3Emethod%3A%20password%3Cbr%3Eproject%3A%20mBank%22%7D%5D')%3Cbr%3Enull |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.oauth.digigante.com
95.217.235.49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